CVE-2021-33537

HIGH

Weidmueller Industrial WLAN - RCE

Title source: llm
STIX 2.1

Description

In Weidmueller Industrial WLAN devices in multiple versions an exploitable remote code execution vulnerability exists in the iw_webs configuration parsing functionality. A specially crafted user name entry can cause an overflow of an error message buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.

References (1)

Core 1
Core References
Third Party Advisory x_refsource_confirm
https://cert.vde.com/en-us/advisories/vde-2021-026

Scores

CVSS v3 8.8
EPSS 0.0226
EPSS Percentile 84.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-120
Status published
Products (8)
weidmueller/ie-wl-bl-ap-cl-eu_firmware < 1.16.18
weidmueller/ie-wl-bl-ap-cl-us_firmware < 1.16.18
weidmueller/ie-wl-vl-ap-br-cl-eu_firmware < 1.16.18
weidmueller/ie-wl-vl-ap-br-cl-us_firmware < 1.16.18
weidmueller/ie-wlt-bl-ap-cl-eu_firmware < 1.16.18
weidmueller/ie-wlt-bl-ap-cl-us_firmware < 1.16.18
weidmueller/ie-wlt-vl-ap-br-cl-eu_firmware < 1.16.18
weidmueller/ie-wlt-vl-ap-br-cl-us_firmware < 1.16.18
Published Jun 25, 2021
Tracked Since Feb 18, 2026